User account configuration: manage sessions, automatic account deletion, device limits, and account locks
Clients have the ability to configure many of their user account settings in the CSR Admin. You can access them by selecting Settings from the top navigation bar and User Account Configuration from the left navigation bar.
Email verification
You can enable email verification of user accounts by toggling the Email Verification setting.
When a user account has been created, if the user account was created using password verification (not social sign in provider like Google, Facebook, Apple, or third-party auth via OIDC) and the email verification flag is set to ON, then the system requires their email is verified before they are allowed to login. If Email Verification setting is ON and the user has not verified their email, then the user will be unable to login.
When verify email is enabled, a WebSocket event will be generated for VERIFY_EMAIL. You have the option of sending the email when you handle the WebSocket event or you can create an IFX integration that will send the email. Arc XP subscriptions will not send the email.
Email verification can be handled from CSR perspective and/or reader experience, please see Manage user accounts: CSR perspective and Manage user accounts: Reader experience for additional details. Once userâs email is flagged as verified, they will be able to access their account.
Active sessions
To limit credential sharing, you can configure the number of active sessions for your customersâ accounts. For example, when a customer is logged into many devices or shares their account with others, they might reach the limit of possible active sessions. When this occurs, the system generates the Limit is Reached error message. You can then use this error to communicate upgrade options for Friends and Family packages to your customers.
Setting the limit of active sessions
You can configure an accountâs number of active sessions on the User Account Configuration page, in the Active Sessions section. The next time the token refresh occurs, the system invalidates older sessions on a first-in, first-out basis.
Figure 1. A drop-down menu to configure active sessions
Note: The session limit verification happens during the token refresh, not when a user authenticates. The following conditions must apply for the error code to appear:
- The session limit list contains a list of token IDs.
- The IP and the device types are not checked.
First-in first-out logic
See the following example of the first-in, first-out logic. Say, a userâs current maximum session limit is three devices. Then, the following happens:
- The user logs into three devices in the following order:
a. Their home desktop
b. Their phone
c. Their tablet - When they log in with their work desktop, they receive an error message when the subsequent token refreshes on their home desktop.
- If the user then logs back in on their home desktop, the next device-their phone receives an error message during the next token refresh. This happens because only three devices can have sessions simultaneously.
Limitations
The following is the list of active sessions limitations:
- Session limit is token ID-based. The system does not consider the customerâs IP or device type.
- The system does not distinguish between the following:
- Same device login after a customer clears session cookies or storage.
- New device login.
- Users who continue to authenticate on each new device or clear storage get error messages.
Error message flow
The following is the active sessions error flow:
- The SDK or the customerâs frontend automatically attempts the oldest login session on one of the customerâs devices.
- The account reaches the maximum number of devices logged in.
- The POST
/identity/public/v1/auth/login
(or/identity/public/v1/auth/token
) endpoint returns the error code100013
. - The customer sees the Limit is Reached message.
User sign-in expiration
The amount of time that users can remain logged in via a persistent session without having to resubmit their login credentials is also configurable. There are two types of session tokens that Arc uses for access control. This way you can have strongly-authenticated sessions which expire fast, and weaker-authenticated re-creatable sessions.
The refresh token is configurable and is created when users first log in and then invalidated when the TTL expires. You can configure the amount of time the refresh token is valid by updating the value in the User Sign In Expiration drop down. Changes to the User Sign In Expiration setting apply to users that log in after the updated has been made and prior created tokens will be updated at TTL expiration.
Session Tokens | Time To Live | Description & Use |
---|---|---|
Access Token | 15 Minutes | Refresh take place in the background so customers can stay logged in based on a valid refresh token |
Refresh Token | Configurable Default: 365 days | Controls the frequency that customers must re-login and provides a remember-me experience for the reader. If not using the SDK: When the access token expires call POST /identity/public/v1/auth/token to request the new access token |
access-token
and refresh-token
are returned during Sign up and/or login.
Revoking user sessions
Active user sessions need to be revoked when there is an attack on user accounts, a password is changed or an account is removed. This will require the user to login with their current or new password and ensures that bad actors cannot gain control of accounts.
We offer multiple methods for revoking session tokens.
- In the Customer Service Admin application there is a button in the Account Access tab to revoke all user session tokens.
- A Developer API Is available to complete a bulk session revocation on all accounts that may have been compromised.
Account lock out
In order to keep user accounts safe, you can configure the number of times fail logins are attempted before the account is locked out. A locked out user is blocked from logging in for a set period of time.
You can configure the amount of failed login attempts by changing the value in the Account Lock Out drop down. You can also set the time a user must wait before they are able to log in again.
If the account is locked, a CSR can manually unlock it without needing to wait for the automatic unlocking process.
Account deletion
Requests for account deletion can come from users directly through an online request, by contacting customer service representatives, through a developer api or from automated systems. You also have the ability to configure rules for deleting accounts that have never been used or that have been inactive for a set period of time. For all deletion options, you can check to confirm that no active subscriptions exist and all critical financial and tax information is anonymized. The user must contact support to cancel the subscription prior to the account deletion.
The deletion process consists of a request to delete the account and then approval or rejection. The user makes a request to a customer support representative from an account management UI or from an automated system. The approval step is automatic if the request comes from an automated system but must be manually approved if made by a user. A customer support manager can manually approve the request in the Requests tab, or a user can approve the request by responding to a notice sent to their email.
After the deletion is requested, a Pending Approval status appears in the user profile overview. After the deletion has been approved and completed, the system removes the account and anonymizes all financial records. This is a permanent action and cannot be undone.
Automatic account deletion
It is not always valuable to keep accounts that have never been accessed, and, in some cases, it is required to remove accounts that have been inactive for a significant amount of time. You can automate the removal of inactive accounts, and you can configure the timing and number of messages in the Settings admin. This can be enabled by toggling the flag beneath the Automatic account deletion section.
The configuration options appear after you turn this option on. Then you can set the number of days and contact message attempts.
Deletion timing can be configured separately for idle accounts and ones that are unused. Idle accounts include ones where the user has not logged in for the set number of days but had previously been active. Unused accounts have never had a log in or the email was never verified.
For all deletion options, you can check to confirm that no active subscriptions exist and all critical financial and tax information is anonymized. Remember, these are permanent actions and cannot be undone.
Deleting idle accounts
For idle accounts, a number of contact attempts can be set to message the user and ensure the account should be removed. The contact attempts are sent by Arc as WebSocket events ACCOUNT_DELETION_NOTIFICATION
with the account owner information and details of the impending deletion. The events can be used to create notifications informing the user that the account will be deleted if no login or action is completed.
Once this feature is enabled any account whose last logged in is higher than X days (âXâ corresponds to âdays of idle timeâ ) will start to be notified. Unused accounts have never had a log in or the email was never verified will start to be notified if these accounts have been created for more than Y days (Y corresponds to âdays before deleting unused accountâ).
For idle accounts, âDays of idle timeâ is basically the time from which the notifications will start going out notifying the account will be deleted. Thus, once the end-user has received the first notification, the account will be deleted in the next âcontact attemptsâ * (7-weekly or 30-monthly) days. The user will receive as many notifications CSR had defined in âcontact attemptsâ.
Deleting unused accounts
For unused accounts, accounts that have never had a log in or the email was never verified, once they receive the first notification, if the user doesnât take any action, the account will be deleted in the next 7 days.
Unused accounts do not have notification settings and will be deleted after the set time.